Annual report [Section 13 and 15(d), not S-K Item 405]

Cybersecurity Risk Management and Strategy Disclosure

v3.26.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2025
Cybersecurity Risk Management, Strategy, and Governance [Line Items]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]

In the ordinary course of our business, we receive, process, use, store and share digitally large amounts of data, including user data as well as confidential, sensitive and proprietary information. We depend largely upon our information technology systems in the conduct of all aspects of our operations. Maintaining the integrity and availability of our information technology systems and this information, as well as appropriate limitations on access and confidentiality of such information, is important to our operations and business strategy. To this end, we have implemented processes and systems designed to assess, identify, and manage risks from potential unauthorized occurrences on or through our information technology systems to prevent adverse effects on the confidentiality, integrity, and availability of these systems and the data residing in them.

Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block] we have implemented processes and systems designed to assess, identify, and manage risks from potential unauthorized occurrences on or through our information technology systems to prevent adverse effects on the confidentiality, integrity, and availability of these systems and the data residing in them.
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Text Block] During 2025, we did not identify any cybersecurity breaches that materially affected, or are reasonably likely to materially affect, our business strategy, results of operations, or financial condition.
Cybersecurity Risk Role of Management [Text Block] we have implemented processes and systems designed to assess, identify, and manage risks from potential unauthorized occurrences on or through our information technology systems to prevent adverse effects on the confidentiality, integrity, and availability of these systems and the data residing in them.